General

  • Target

    NEAS.6375eb674425b3fd0d11d4d9af992ab1_JC.exe

  • Size

    333KB

  • Sample

    231022-qqrghaae64

  • MD5

    6375eb674425b3fd0d11d4d9af992ab1

  • SHA1

    370f6426461e6f80a2490a201fcea8c9e31d91dd

  • SHA256

    91ac73591be2a2f745242dd09fc4c3105c5ce37e038f394c6d7ecf819b3de6c8

  • SHA512

    aa143e338706a1919e6464b948fb30a868ddb41375ac37ab287bbb108747dc7508d05e7aff8c9115aed8463e35d66f7c1e60a53248e293b010ea42835be83550

  • SSDEEP

    6144:JjluyDM3Io5R4nM/40yJNndLP/2lfrVl0acAmgrvGLRqyW33I/3Gc2JLaWosF74z:JEyDMhqhZ5afrz6XOG9qyW33I/3Gc2J4

Malware Config

Targets

    • Target

      NEAS.6375eb674425b3fd0d11d4d9af992ab1_JC.exe

    • Size

      333KB

    • MD5

      6375eb674425b3fd0d11d4d9af992ab1

    • SHA1

      370f6426461e6f80a2490a201fcea8c9e31d91dd

    • SHA256

      91ac73591be2a2f745242dd09fc4c3105c5ce37e038f394c6d7ecf819b3de6c8

    • SHA512

      aa143e338706a1919e6464b948fb30a868ddb41375ac37ab287bbb108747dc7508d05e7aff8c9115aed8463e35d66f7c1e60a53248e293b010ea42835be83550

    • SSDEEP

      6144:JjluyDM3Io5R4nM/40yJNndLP/2lfrVl0acAmgrvGLRqyW33I/3Gc2JLaWosF74z:JEyDMhqhZ5afrz6XOG9qyW33I/3Gc2J4

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks